Showing 110 open source projects for "java class analysis"

View related business solutions
  • Process Street | Compliance Operations Platform Icon
    Process Street | Compliance Operations Platform

    Systemize execution. Prove compliance.

    Bring compliance and operations under one roof with an AI agent that automates workflows, policies that enforce rules, and a platform that delivers results.
    Learn More
  • Digital business card + lead capture + contact enrichment Icon
    Digital business card + lead capture + contact enrichment

    Your complete in-person marketing platform

    Share digital business cards, capture leads, and enrich validated contact info - at events, in the field, and beyond. Powered by AI and our proprietary data engine, Popl drives growth for companies around the world, turning every handshake into an opportunity.
    Learn More
  • 1
    A JNI wrapper for the Microsoft Data Protection API
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Cnc's IP Data Volume Report

    Logs IP to IP contact, number of packets, bytes.

    Cnc's IP Data Volume Report: Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too! View via local web interface. Very simple for those who want to view who your computer is contacting the most!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Security Analyst Network Connection Profiler [sancp] is a network security tool designed to create connection logs and record network traffic for the purpose of auditing, historical analysis, and network activity discovery.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The Advanced Network Traffic Analysis Research and Exploration Suite (ANTARES) is a toolkit for working with flow attributes - computations that can be used to distinguish between different uses of the network, even without using packet payloads.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Modernize Your Lab with the #1 Rated LIMS Icon
    Modernize Your Lab with the #1 Rated LIMS

    Labs that need a powerful LIMS system

    Nothing is more critical to a lab’s success than the quality, security, and traceability of samples. The Lockbox LIMS system provides robust sample management functionality to laboratory professionals, giving them full visibility on every aspect of a sample’s journey, from accessioning to long-term storage.
    Learn More
  • 5
    Type no more passwords. Use PhoneID to store passwords on your mobile phone, and automatically send them to Windows login, browsers, FTP/SSH clients, OTP, file encryption, PKI, etc. Uses BlueCove. See Wiki page for more details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Command line encryption tool for one time, daemon, or stream data processing. Data stats, check sums, conversion to/from text. Data/keys from files, pipes, standard input. In-place/diverted processing or data-analysis-only. Random, file, password keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    vSentinel is a customizable 3D mapping of your network monitoring or security data for real-time or trend-based attack and anomaly detection and analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Mica has been developed in the project SicAri (www.sicari.de), sponsored by the BMBF (www.bmbf.de), and allows for all kind of means authentication at windows systems. Mica is based on Kerberos and therefore supports single sign-on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers.
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • Top Corporate LMS for Training | Best Learning Management Software Icon
    Top Corporate LMS for Training | Best Learning Management Software

    Deliver and Track Online Training and Stay Compliant - with Axis LMS!

    Axis LMS enables you to deliver online and virtual learning and training through a scalable, easy-to-use LMS that is designed to enhance your training, automate your workflows, engage your learners and keep you compliant.
    Learn More
  • 10
    This project aims to release an IP unencumbered implementation of the core services provided by Mesmerize: an open framework for enterprise security management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    NSAT is a fast, highly configurable, bulk network security scanner for over 50 different services and hundreds of vulnerabilities. It's main advantage is its flexibility and configurability.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    Windows Port Knocking. A Windows implementation of port knocking developed to work alongside an existing firewall (the free CHX-I Packet Filter v3.0).
    Downloads: 9 This Week
    Last Update:
    See Project
  • 13
    Open architecture for promoting and enabling trust for electronic services on multiple platforms (web, mobile, proprietary, etc).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A linux liveCD for the non-invasive, non-destructive detection and analysis of WiFi (802.11) networks. It also provides mechanisms to set up a PC as an 802.11 Access Point.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Open source DRM for MPEG-4 and MPEG-2 adhering to ISO/MPEG IPMP open standards (MPEG IPMP Hooks and IPMP-X), ISMAcryp and OMA DRM 2 specs. Includes CA, PKI, DOI mgmt, ISMA streaming, license server, encoding/encryption, player, plugin architecture, etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    An attempt to collect (read rewrite) a set of tools for Ultima Online game playing. Many tools are closed source or discontinued: no way to enhance them with no sources. Here there will be such tools and sources.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 17
    SwiftCrack is a wireless LAN (WLAN) tool which recovers encryption keys. SwiftCrack operates by proactively monitoring transmissions, injecting traffic with known key streams, computing the encryption key when enough packets have been gathered.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Distributed rainbow table generating
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    CryptoServer is the daemon for handling Sign-Verify, Encryption-Dencryption, Envelop-Openenvelop based on OpenSSL including the SEED symmetric algorithm (Korean Standard Symmetric Algorithm). It's interface is just tcp/ip socket and very easy to handle
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Set of tools and libs for managing structured data in a very flexible way: Imp./Exp. ASCII, XML, SQL, PS, Tex/LaTex, RTF GUI: X-Windows, MS-Windows Interface to C++, DBs, Perl, PHP, Java, TCP/IP LISP-like interpreter written in C++ using C-LIB
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    DecodeBase64 does exactly what the title says: it decodes strings encoded with the Base64 algorithm. Source code is provided in both Java and C++.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    M-ICE is a modular hostbased intrusion detection framework. It is used as middleware to close the gap between IDS research and IDS development. M-ICE consists of various parts that can be connected together by using network-or interprocess-communication
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The algorithm allows any kind of weights (costs, frequencies), including non-numerical ones. The {0, 1, ..., n-1} alphabet is used to encode message. Built tree is n-ary one.The algorithm is based on a set of template classes : Cell(SYMBOL, WEIGHT), Node(
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    The purpose of this project is to provide a biometric security solution by using voice print, fingerprint and/or facial recognition along with a password and/or smart card support using AES to protect data. Please read forums for if interested.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB